H04L2209/60

Tracking unique video game digital media assets using tokens on a distributed ledger

A system and method for tracking digital assets associated with video games. The digital assets may be in-game digital assets, such as in-game items or characters. The digital assets may be video game digital media assets representing moments of gameplay of a video game, such as video clips or images. The digital asset is created, and a distributed ledger tracking a history of the digital asset is created and stored across devices. A unique token for the digital asset can include a unique identifier and metadata identifying properties of the digital asset. Changes to properties of the digital asset, such as ownership, visual appearance, or metadata, can be identified in a request to update the history. A new block can be generated for, and appended to, the distributed ledger identifying the changes to the history of the digital asset. The new block can include hashes of previous blocks.

SECURE RICH COMMUNICATION SERVICES MULTICAST SYSTEM

An improved telecommunications network that can reduce the network load on a rich communication services (RCS) server and/or local routers that implement 1-to-N and/or M-to-N services is described herein. In particular, the improved telecommunications network may include an improved RCS server that can route secure multicast messages instead of and/or in addition to unicast messages. For example, the improved RCS server can create a multicast group for a group of UEs in response to a request from a UE to create a group of UEs. Creation of the multicast group may include creating a shared multicast group key (SMGK) for the multicast group and/or selecting a security algorithm for the multicast group. The improved RCS server can then distribute the SMGK and/or the selected security algorithm to the UEs such that the UEs can use the SMGK and/or the selected security algorithm to encrypt and/or decrypt messages.

Immutable ledger method and apparatus for managing the distribution of content
11736563 · 2023-08-22 · ·

A system comprising a plurality of peer caches associated with a corresponding plurality of content owners; shared ledger logic having a channel for each content owner of a plurality of content owners, the shared ledger logic to maintain a shared ledger data structure and to perform the operations of: in response to receipt of a first content title, responsively recording a first ledger entry for the first content title which is visible to a first content owner which owns the first content title; receiving an encryption key from the content owner, wherein the first content title comprises an encrypted content title encrypted with the key; storing the encrypted content title on one or more network storage devices; and when the encrypted content title reaches an edge cache, using the key to decrypt the encrypted content title and updating the first ledger entry to identify the edge cache.

System and method of managing pseudo-random number generation in a multiprocessor environment
11733971 · 2023-08-22 · ·

This relates to hierarchical pseudo-random number generation for use in computer simulations that operate across more than one computing machine.

SYSTEM AND METHOD USING DISTRIBUTED BLOCKCHAIN DATABASE
20230261880 · 2023-08-17 ·

A content distribution system includes content receivers that provide a plurality of blockchain databases that store transaction records associated with subscriber requests for content, and a computer system that processes those transaction records and enables authorized content receivers to output requested content.

Platform for collaborative processing of computing tasks
11327807 · 2022-05-10 · ·

Methods, systems, and media for a platform for collaborative processing of computing tasks. The method includes sending, to client devices, a one or more client applications including program code associated with an interactive application and a machine learning application. When executed, the program code causes the client devices to generate a user interface for the interactive application; request, using the generated user interface, inputs from a user of the client devices; receive the requested inputs; process, using computing resources of the client devices, at least part of the machine learning application; and transmit data associated with results of the received inputs and the processing of at least part of the machine learning application. The method further includes receiving and processing the data associated with the results of the received inputs and the processing of at least part of the machine learning application to process the computing tasks.

METHOD OF HASHING A VIDEO STREAM
20230261879 · 2023-08-17 ·

In accordance with an embodiment, a video flow transmission method includes: the generating, by an image sensor, a video flow comprising first and second images; hashing, by the image sensor, a portion of the first image based on a first hashing configuration to generate a first hash value, the first hashing configuration defining first positions of pixels to be hashed; hashing, by the image sensor, a portion of the second image based on a second hashing configuration to generate a second hash value, the second hashing configuration being different from the first configuration and defining second positions of pixels to be hashed; and transmitting, by the image sensor, the first and second images, and the first and second hash values, to a second device.

Verification code generation method, data verification method and electronic device

A verification code generation method is performed in an electronic device which is for performing encoding to generate a video/audio stream having multiple data segments. The verification code generation method includes the following steps. Each time one of the data segments is generated by the encoding, a first-level checksum associated with the data segment is generated, and the first-level checksum is recorded in an accompanying verification file. At an interval of every N data segments of the data segments, a second-level checksum is generated for W consecutive first-level checksums, and the second-level checksum is recorded in the accompanying verification file, such that a subsequent verification method can quickly verify integrity of a part of data according to the accompanying verification file. Wherein, W is a positive integer greater than or equal to 2, N is a positive integer greater than 0 and smaller or equal to W.

PROCESS FOR CREATING A TRADABLE NONFUNGIBLE TOKEN FOR RECYCLABLE MATERIALS

A process is disclosed for establishing ownership and value in collected recyclables. Collected solid waste is transported to a collection facility and weighed at entry and an amount of deposited recyclables determined and attributed to each customer serviced in the collection jurisdiction. A digital file is created representing the attributed amount of recyclables for each customer, and a worker utilizes a third-party tokenization service to convert the digital file into a nonfungible token or NFT, thereby establishing value for the NFT. The tokenization provider then mints and records the nonfungible token on a targeted blockchain using smart contracts, such as for example on the Ethereum blockchain, and sends a confirmation to the waste collection contractor. The waste collection contractor then transfers the NFT to the customer so that the customer may freely trade the NFT on the open market. The process promotes a sustainable recycling program for the public.

Elliptic curve isogeny based key agreement protocol

An electronic key pre-distribution device for configuring multiple network nodes with local key information is provided. The key pre-distribution device applies at least a first hash function and a second hash function to a digital identifier of a network node. The first and second hash functions map the digital identifier to a first public point and a second public point on a first elliptic curve and second elliptic curve. A first and second secret isogeny are applied to the first and second public elliptic curve points, to obtain a first private elliptic curve point and second private elliptic curve point that are part of private key material for the network node.